Correctly check http git access rights for reverse proxy authorized users (#3721)

tokarchuk/v1.17
Lauris BH 7 years ago committed by Lunny Xiao
parent 4c6e170ceb
commit ab5cc6f3a9
  1. 2
      routers/repo/http.go

@ -184,6 +184,7 @@ func HTTP(ctx *context.Context) {
return return
} }
} }
}
if !isPublicPull { if !isPublicPull {
has, err := models.HasAccess(authUser.ID, repo, accessMode) has, err := models.HasAccess(authUser.ID, repo, accessMode)
@ -211,7 +212,6 @@ func HTTP(ctx *context.Context) {
return return
} }
} }
}
if !repo.CheckUnitUser(authUser.ID, authUser.IsAdmin, unitType) { if !repo.CheckUnitUser(authUser.ID, authUser.IsAdmin, unitType) {
ctx.HandleText(http.StatusForbidden, fmt.Sprintf("User %s does not have allowed access to repository %s 's code", ctx.HandleText(http.StatusForbidden, fmt.Sprintf("User %s does not have allowed access to repository %s 's code",

Loading…
Cancel
Save